SAN DIEGO (KUSI) — A man accused of ambushing a janitorial worker at a Little Italy coffee shop and trying to sexually assault her pleaded not guilty Wednesday to a half-dozen felony charges, including kidnapping with the intent to commit a sex offense.Christopher Merron, 28, was ordered held on $1 million bail. He faces life in prison if convicted, said Deputy District Attorney Nicole Roth.Merron allegedly attacked the woman as she was cleaning the coffee shop in the 1700 block of India Street about 4:30 a.m. last Sunday, pushing her into a back room, taking her car keys and threatening her with a knife.Following a struggle, the victim, whose name was withheld, was able to break free and run out of the building, said San Diego police Lt. Jason Weeden.The assailant then fled in the woman’s tan 1998 GMC Jimmy SUV.Merron was arrested in Mission Valley the next day and the victim’s stolen SUV was recovered, Weeden said.“This was a brazen and serious sex crime,” Roth said outside court. “This was a traumatic event.”Besides kidnapping with the intent to commit a sex offense, Merron is charged with assault with the intent to commit a sex offense, attempted oral copulation, false imprisonment with force, robbery and auto theft.Merron will be back in court Oct. 26 for a readiness conference and Oct. 30 for a preliminary hearing. KUSI Newsroom, Man accused of attempted sexual assault in Little Italy pleads not guilty Posted: October 17, 2018 KUSI Newsroom October 17, 2018 Categories: Local San Diego News FacebookTwitter
Where is the VenkatalakshmiTwitterRaai Laxmi’s much-awaited film Where is the Venkatalakshmi (WITV) was leaked online on its opening day and the free download of the full movie is likely to take a toll on its collection at the box office.Raai Laxmi, who is known for her item numbers, had released her latest movie Where is the Venkatalakshmi on March 15. The actress, who has promoted the film heavily, is hoping that it will be a big hit of her career. But to her disappointment, a notorious gang has released the full movie for free download.This notorious gang apparently recorded the complete movie of Where is the Venkatalakshmi during its screening in a cinema hall and leaked on its website even before the film completed its first day at the box office. The website offers seven different types of prints ranging from 2.2 GB to 200 MB frp, free download. Some people, who watch this pirated copy, advise others not go for it. Where Is The VenkatalakshmiTwitterWhere is the Venkatalakshmi is a horror comedy film with interesting twists and turns. The movie is about two siblings Chanti Gadu (Praveen) and Pandu Gadu (Madhu), who create a lot of trouble in their village. Both of them fall for a teacher named Gauri (Lakshmi Rai). But to their shock, Gauri is a ghost who forces them to bring a box from the goons. How they manage to save the lives forms the crux.Where is the Venkatalakshmi starring Laxmi Raai, Praveen, Madhu Nandan, Pujita Ponnada and Brahmaji, is a small budget movie and it is said to have earned table profit its producers before its release. The movie was released in a limited number of screens as it clashes with five other new movies. The film has got a good opening at the box office and is able to strike a chord with the viewers. Where Is The VenkatalakshmiTwitterThe word of mouth has boosted its collection on Saturday and Sunday, but many are not able to watch it due to its unavailability in their nearby theatres. This apparently forced some filmgoers to find its pirated copy on torrent sites. The makers need to address the issue quickly. Otherwise, it will affect its collection at the box office.We at International Business Times, India are strictly against piracy of any film and we condemn people who support it. We always stand by the film industry which has suffered huge losses due to piracy. We also request you to join us in the fight against piracy.Say no to piracy and encourage filmmakers by watching films in cinema halls.
Rohingya refugee. Photo: Syful-IslamRepresentatives from Bangladesh and Myanmar will meet on Tuesday to discuss the repatriation to Myanmar of more than 6,500 Rohingya Muslims trapped on a strip of unclaimed land between the two countries, Bangladeshi officials said.“It is about taking them back to Myanmar,” relief and refugee repatriation commissioner Mohammad Abul Kalam, told Reuters on Monday. “They are on the zero line and actually on the Myanmar side.”However, several officials contacted in neighbouring Myanmar said they were not aware of plans for a meeting, which Kalam said would take place on the ‘zero line’ near a place called Gundum.A spokeswoman for the United Nations High Commissioner for Refugees (UNHCR), which will not be involved in the talks, said the agency was concerned the Rohingya may be forcibly returned to Myanmar without due consideration for their safety.Nearly 700,000 Rohingya have fled Myanmar’s Rakhine state and crossed into Bangladesh since last August, when attacks on security posts by insurgents triggered a military crackdown that the United Nations has said amounts to ethnic cleansing, with reports of arson attacks, murder and rape.Buddhist-majority Myanmar denied the charge and says its security forces are fighting a legitimate campaign against ‘terrorists’ it blames for the attacks on the security forces.The vast majority of Rohingya who fled are in camps at Cox’s Bazar on the southern tip of Bangladesh, but several thousand who arrived in a buffer zone along the border are now stuck.Bangladesh security forces have been instructed not to let these Rohingya cross the border, and many of them have said they would rather stay there to avoid becoming refugees in Bangladesh.The no-man’s land, which is about the size of 40 soccer pitches, used to be an area of paddy fields, but is now dotted with the tarpaulin and bamboo shacks of displaced Rohingya.NO TIMELINE FOR RETURNS“We are concerned about the reports of pressures directed at this group of people at the border,” said Caroline Gluck, UNHCR Senior Public Information Officer at Cox’s Bazar.“People who fled violence and discrimination in Myanmar should not be forced to return against their will,” she told Reuters in a message sent on Saturday.Bangladesh’s Kalam said there was no timeline for repatriations, that anyone going back must do so voluntarily and that Myanmar must provide a safe environment for their return.“We cannot send them forcibly,” he said.Most Burmese consider the Rohingya as unwanted immigrants from Bangladesh, and the army refers to them as “Bengalis”.Myanmar has said it will accept back people holding “national verification” registration cards. This card, which falls short of offering citizenship, has been rejected by Rohingya community leaders who say it treats life-long residents like new immigrants.A leader of the Rohingya group in the buffer zone, Dil Mohammed, told Reuters in a text message: “Our no-man’s land camp demands are that there must be a safe return, we need security and all basic rights, including citizenship.”He said the group would never accept the national verification card, that its members must be allowed to return to their own homes, paid compensation for losses and damage, and provided with protection from a U.N. mission.Gluck said the UNHCR was concerned that conditions in Rakhine state were not yet safe for voluntary returns, adding, “We urge both governments to ensure that any return is based on informed consent and takes place in safety and dignity.”
A man was killed and another injured after a bus hit a motorcycle on Khulna-Mongla road in Bagerhat’s Rampal upazila on Friday, reports UNB.The deceased Sanjay Kumar, 35, is of Fotehpur village of sadar upazila.Md Robiul Islam, officer-in-charge of Katakhali highway police, said a Khulna-bound bus collided head-on with a motorcycle around 3:00pm injuring two riders.Physicians pronounced Sanjay dead after he was taken to the hospital.Police seized the bus but its driver and his assistant managed to flee.
By The Associated PressMichelle Obama is marking the 53rd anniversary of the Voting Rights Act by urging Americans to participate in a week of action to get people signed up to vote.The former first lady, a co-chairwoman of a nonpartisan organization to encourage voting, announced Monday that the When We All Vote Week of Action will be held Sept. 22-29.Former first lady Michelle Obama is marking the 53rd anniversary of the Voting Rights Act by urging Americans to participate in a week of action to get people signed up to vote. (AP Photo/Gerald Herbert)She said members of When We All Vote will be traveling the country to register voters and get them excited about the November midterm elections, when Democrats hope to capitalize on a wave of anger against President Donald Trump and take back control of Congress from the Republicans.“With so much at stake in our country, sitting on the sidelines isn’t an option,” Mrs. Obama said in an email to supporters.Flagship events will be held in at least 12 cities, including Detroit, Los Angeles, Miami, Chicago and New York. The group wants volunteers to host events in other communities that week as well.Other co-chairs of the group include actor Tom Hanks; “Hamilton” creator Lin-Manuel Miranda; singers Janelle Monae, Faith Hill and Tim McGraw; and NBA point guard Chris Paul of the Houston Rockets.The organization said they anticipate that Mrs. Obama and other co-chairs will attend some of the events.The Voting Rights Act, signed into law by President Lyndon B. Johnson on Aug. 6, 1965, prohibits racial discrimination in voting. Mrs. Obama said it’s important to recognize the organizers, marchers and other volunteers who helped get the law passed.“We want to honor their legacy and continue their work to ensure that every eligible American cast their vote, work that is far from finished,” the former first lady said in a video.
The Delhi high court on Monday agreed to hear on Tuesday a plea seeking to restrain the civic bodies in the national Capital from going on strike again.The matter was mentioned before a Bench of justices Badar Durrez Ahmed and Sanjeev Sachdeva which directed that it be listed for hearing on Tuesday. The petition was filed by a lawyer who moved the court as an association of MCD unions has again called a strike on July 22 demanding primarily reunification of the three Corporations as well as payment of pending salaries and other arrears. The association also made other demands which include declaration of sanitation workers as technical employees, timely payment of terminal benefits of retired and deceased employees, pension benefits, cashless medical card facility as well as providing houses to them. The petitioner, Sanjeev Kumar Arora, said that proposed strike of July 22 “is of much wider consequence” as it has been called by all the employees of the Municipal Corporations of Delhi and thus it will “jeopardise the health, safety and normal life of the people” of the city.
Brought to you by PCWorld The world of science fiction is rapidly becoming fact, from tabletops that charge your laptop wirelessly to wall-mounted PCs that recognize your face and gestures. Thanks to breakthroughs in miniaturization, you’ll be able to tuck products into your pocket that wouldn’t have fit into your briefcase a few years ago, such as projectors and photo printers. The next generation of Internet technology will change everything from TV to Coke machines. And standard computer building blocks are growing ever more powerful, as processor makers squeeze more cores onto each chip and drive makers pack more bits into each platter–guaranteeing that even ordinary PCs of the future will be anything but ordinary.In the pages that follow, we spotlight a dozen major innovations, from ones right around the corner to a few that won’t show up until at least 2012. On multiple fronts, the future you’ve been waiting for has almost arrived. Here’s what you need to know to prepare for it.Kiss Your Power Cord Good-ByeYou hardly think twice about connecting your wireless laptop to the Internet, but you still have to fumble for a power cord when your battery runs out. How quaint. Soon all those cumbersome power bricks will be just a footnote in your grandchildren’s history books, as wireless charging comes to market.What is it? Currently two ways to accomplish wireless charging exist. Inductive charging works by matching the resonance of the charging pad’s electromagnetic field to that of the battery, allowing the battery to charge over a small physical gap. In contrast, conductive charging passes electricity directly between two surfaces in contact. Which method will win out is not yet clear, but in either case you’ll be able to simply place your laptop, phone, and music player onto a universal wireless charging pad that will immediately begin juicing them up.When is it coming? Next year both inductive and conductive charging technologies will emerge onto the market, but most devices will require a $30 adapter to work with them. WildCharge expects to roll out its first conductive-charging notebook product (paired with a compatible notebook) in time for 2008’s back-to-school season, while eCoupled is pushing to get its inductive technology into cars, countertops, and desk surfaces by 2009. Look for wireless charging to become commonplace in 2010, after major phone and laptop vendors sign on to support it.Print From Anywhere (and Anything)Forget about running home to print out your photos or–gasp!–ordering prints online. The next generation of mobile devices will come with their own built-in printers.What is it? Zink (short for “Zero Ink”) Imaging, a spin-off of Polaroid, has been working on a new way of making photo paper. Zink paper has a crystal substrate sandwiched between its layers that colorizes as it passes through a slim-profile printer. The printers themselves are so small that you can slip one in your pocket, and they can easily be built into cameras, laptops, or other devices.When is it coming? In 2008, Zink will partner with a major camera vendor (name not announced) to release the first pocket-size digital camera with a built-in printer. This early model will produce 2-by-3-inch photos. At the same time, the company will begin selling a tiny handheld printer (probably for about $99) for camera phones; it’ll print adhesive-backed photos that will likely grace the school binders of many eighth-graders. Two or three years after that, the technology may be integrated into laptops and other mobile devices.Great Graphics Inside”Integrated graphics” has long been synonymous with “sluggish graphics.” But soon the phrase will have a whole new meaning, thanks to new CPUs with powerful graphics hardware built in.What is it? AMD’s acquisition of ATI brought the company’s rivalry with Intel–which already made its own basic graphics chips–to a new level. Since then the two competitors each have been working to bridge the gap between CPUs and graphics processors. Building graphics-processing functionality directly into a CPU eliminates the delay you’d otherwise experience as data passes between the CPU and GPU across the system bus. Such combined CPU/GPUs will feature DirectX 10 support and acceleration for Blu-ray and HD-DVD while consuming substantially less power, requiring less space on the motherboard, and performing significantly better than most of today’s discrete graphics cards do.When is it coming? Intel plans to put its graphics-integrated Nehalem processors into production in 2008, beginning with a line of server chips. AMD intends to release its integrated Puma notebook platform about the same time. In 2009, Intel will bring its graphics-integrated chips to desktops and notebooks, while AMD’s Puma will likely reach desktops in 2010.Screens Get the BendsThe smaller and more powerful devices become, the harder they are to use. Tiny screens just don’t cut it when you want to do real work. But if your phone or PDA came with a large roll-out display, you could work in comfort without sacrificing portability. That’s where flexible polymers will come in.What is it? Display manufacturers make traditional LCD screens by sandwiching liquid crystals between layers of glass and then zapping them with electricity. Replacing that glass with plastic makes things a little more malleable. Initially developed by E Ink and Philips, so-called electronic paper compresses organic light-emitting diode (OLED) crystals between very thin layers of polymer, allowing for tremendous flexibility. Unlike conventional LCD screens, such ultrathin displays are completely shatterproof, and can even be rolled up into tight spools. The result is a wide-screen monitor that you can carry in your pocket and use anywhere. Better still, such screens will be cheaper and easier to manufacture than today’s flat panels–they’ll simply be printed directly onto sheets of plastic.When is it coming? First-generation flexible displays are already here–they’re just not that flexible yet. E Ink’s electronic paper can be found in such nonflexible products as the $300 Sony Reader and the $130 Motorola Motofone F3. The first actually rollable displays, created by the labs of Philips’s Holland-based spin-off Polymer Vision, will reach the market in 2008: A cell phone from Telecom Italia will carry the world’s first Polymer Vision roll-up display. Currently under wraps, the phone (pricing not yet available) is expected to offer a 5-inch, 320-by-240-pixel, monochrome rollable display. By 2010, Polymer Vision expects to market larger color displays with much higher resolution.The First Real Net PhonesSimple wireless calling satisfied users during the first generation of cell phones, but the second generation (2G) made things more interesting with the introduction of SMS messaging and WAP Internet browsing. 2.5G added pictures and video, but at speeds that feel more like dial-up than broadband. (That’s the main problem with the iPhone’s data service.) With 3G, higher-bandwidth connections have made 2.5G’s multimedia capabilities palatable. 4G will be a whole lot cooler.What is it? The fundamental difference between 4G and 3G is the way in which the networks will be switched. Until now, most phone networks (except for VoIP) have been circuit switched, meaning a dedicated circuit is activated between the callers. This outdated method puts voice calls in a category all their own, distinct from data connections, and prevents cell phones from transmitting voice calls and data simultaneously. 4G networks will be IP switched, just like all the traffic on the Internet. That not only means that you’ll be able to talk and text at the same time, but also that your 4G device will be able to do far more on the network than it can today. IP-switched cellular networks will work more as ISPs do, allowing for greater flexibility in running data applications. Just about any device–from a phone to a laptop to a Coke machine–will be able to connect to the network, and you’ll be able to do just about anything with it. Another result of this flexibility: Wireless carriers will likely be forced to loosen their iron grip on the services customers can use over their networks, giving everyone more freedom to communicate from the road.When is it coming? The four major U.S. wireless carriers are just scratching the surface of what their 3G networks can do, and most consumers seem uninterested in more-advanced data streaming. But the underlying technology for 4G networks, WiMax, exists now and is slowly growing in large enterprise networks and telecom companies. WiMax itself is not a cellular technology, however, and before a fourth-gen cellular network can evolve, the industry will need to find a new telecommunications protocol to base it on. As business users increase their demand for high-end wireless data services, cellular carriers will begin to deploy networks and devices that deliver 4G service. We expect the first handsets and data cards to hit the market in 2011.Enter the Octagon CPURegardless of what Moore’s Law has to say, there’s not much point in increasing processor speeds or doubling the bit paths in a CPU if the system bus can’t carry the traffic anyway. Since problems with transistors leaking current also worsen as clock speeds increase and CPUs shrink, both AMD and Intel have decided to focus on increasing the number of processor cores on a chip instead of increasing processor speeds.What is it? The centerpiece of any given CPU is the processor core, which is responsible for the actual calculations that make all of your software run. Placing multiple cores on a single chip dramatically increases the number of calculations that can be performed, without having to raise the clock speed of the chip itself. By keeping clock speeds relatively low while increasing the number of calculations performed simultaneously, chip makers overcome the inevitable overheating problems associated with faster clock speeds. And the more cores a manufacturer crams onto a single chip, the faster the CPU can go. The performance boost isn’t one-to-one, however: Intel’s four-core 2.66-GHz Core 2 Quad Q6700 performs just 26 percent faster than its same-speed, two-core Core 2 Duo E6700 on certain applications, according to the company (see the results of PC World tests). So while you will see improvement with eight-core CPUs, the speedup won’t be as dramatic as it might sound.When is it coming? Before AMD can start selling eight-core chips for the desktop, it needs to get its quad-core Phenom chips to market in 2008. Intel has been selling quad-core desktop processors for about a year now, and it has announced eight-core chips for servers in 2008. Expect OctoCore–or whatever the company ends up calling it–to come to desktops in 2010.Put Your TV AnywhereDespite the wireless revolution happening all around your home, your high-def television remains shamefully hard-wired in place. Wouldn’t it be great if you could put your TV anywhere you wanted, without worrying about where the cable jack was, and still get top-notch video quality? Soon you’ll be able to do just that.What is it? Wireless High-Definition Interface (WHDI) is a cable-free replacement for HDMI that uses a 5-GHz radio transmitter to send an uncompressed 1080p, 30-fps high-def video signal from a WHDI-equipped DVD player, game console, or set-top box, for example, to a WHDI-equipped TV across a distance of up to 100 feet. Because the WHDI signal is compatible with HDMI, you’ll be able to buy HDMI wireless modems for your existing entertainment gear–and that means you can finally rearrange your furniture the way you’d really like it, without having to run additional cables through your walls.When is it coming? Amimon, which manufactures the WHDI chip set, released the technology to electronics makers at the end of August. Now the race is on to bring WHDI to market. TV makers have already begun demoing new wireless-equipped HDTV models at trade shows, and fans of bleeding-edge tech should be able to get their hands on hardware by the start of the new year. WHDI is expected to add about $200 to the cost of a new TV, so expect to pay a premium for the technology in 2008. WHDI modems for your existing hardware will likely cost $300 to $400 for a pair of adapters (you need at least two–a receiver for the TV and a transmitter for your set-top box, for example–to get started). In a few years, says Amimon vice president of marketing Noam Geri, costs should drop to about $10 for inclusion in a TV and $60 for the adapters.Five Terabytes per DriveEven if you’re not a digital pack rat, you probably still manage to cram a lot of data onto your hard drive. Digital photos, movies, music, and overflowing e-mail folders can pile on the gigabytes before you know it. But don’t worry: Way bigger hard drives are on the horizon.What is it? Heat-Assisted Magnetic Recording, or HAMR (and a nearly identical technology called Thermally Assisted Magnetic Recording), uses lasers to heat the surface of a drive’s platters, making it possible to pack a terabyte of data onto a single square inch of drive surface, roughly twice the current limit. As the drive’s read/write head goes about its business, it briefly fires its laser at the surface, destabilizing the iron-platinum particles for reading and writing. With the platter heated, the read/write head can manipulate the surface on a very fine scale–in just tens of nanometers–letting it cram enormous amounts of information into a small space. A few nanoseconds after the work is done, the surface cools for long-term stability. The way data is organized on a disc will change, as well: Rather than having arbitrarily arranged disk sectors, HAMR drives will work with the natural grain of the disk surface, organizing data into self-arranging magnetic arrays that allow the creation of a single bit of data on every grain of the platter’s surface.When is it coming? HAMR is still very much a research project, but it should be coming to market in the next several years. Seagate expects to introduce 5TB HAMR hard drives by 2011, with capacities of up to 37.5TB to follow a few years after that.A Better InternetTCP/IP, the technology on which the entire Internet is based, is no spring chicken. The current version of the Internet protocol, IPv4, has been around for more than 25 years. The old technology suffers from some serious limitations–including a shortage of addresses for all the computers that use it. Internet Protocol version 6 will change all that.What is it? Unlike IPv4, which uses 32-bit addresses like 22.214.171.124, IPv6 uses 128-bit addresses like 2001:0ba0:01e0:d001:0000:0000:d0f0:0010. This small, simple change permits every person in the world–and even every computer in the world–to have a unique IP address. In addition, IPv6 features network-layer encryption and authentication, enabling secure communications between parties.When is it coming? IPv6 is here right now, and has been for several years, but almost nobody is using it yet because the hardware needed for it remains more expensive than that for IPv4, and few network administrators are trained to manage it. However, the United States government has declared that it will move all of its networks to IPv6 by the summer of 2008, which even at government speeds means the technology should arrive in time to pick up the slack when the pool of available addresses runs out around March 2011. The depletion of addresses should also induce your ISP to update its network before long.A PC in Every SurfaceThough it seems second nature to us now, the idea of manipulating images on a screen by moving around an input device–a mouse–on the desk was revolutionary when Douglas Engelbart introduced it in 1964. But as well as it works, the mouse is still a surrogate for a far more natural human interface, the fingertip. Over the next few years, a new category of PCs will put your fingers in control.What is it? Tabletop computing (aka surface computing) gets back to basics by letting you gather around a table with some friends for some good old-fashioned interactivity. Accepting a variety of input types simultaneously, tabletop PCs allow multiple users to work with data projected onto the surface of the table by touching on-screen objects with their fingertips. Many companies are working on tabletop computing technologies, but two of the leading efforts are Microsoft’s camera-driven Surface PC and Mitsubishi Electronics Research Labs’ RF-driven DiamondTouch. Surface PCs use rear projection to present an image on the surface of the table from inside, while five infrared cameras in the table track finger movements on the screen. DiamondTouch projects the image from above the table and uses capacitive coupling (like that employed in laptop touchpads) to follow your fingertips–with this design, though, you create shadows when you touch it.When is it coming? MERL’s DiamondTouch is still predominantly a research project, but Microsoft’s Surface PC will arrive this year at a hotel, casino, or cellular store near you. First-generation Surface PCs will be strictly for showcasing in public locations, but Microsoft expects to offer a conference-room version for businesses by 2010. Home users will get them three to five years from now. Eventually, says Microsoft, you can expect to have Surface PCs built into countertops, mirrors, or just about any other flat spot in your home.Put Your Data in the Fast LaneAs CPUs grow more powerful and graphics cards rocket toward ever higher levels of realism and detail, a significant bottleneck in your PC’s data flow remains: the system bus. When data travels through your PC, it’s the system bus–not the processor–that limits overall performance. What you need is a faster bus.What is it? PCI Express (PCIe) is the leading system bus architecture for high-end hardware such as graphics cards. The current specification, version 2.3, offers a data transfer rate of 5.2 gigabits per second. The next generation, PCI 3.0, will offer a data rate of 8 gbps. In addition to supporting much higher GPU performance, a key benefit of PCIe 3.0 may be the ability to power graphics cards directly from the system bus, rather than requiring a line into the power supply. But there’s a catch: In order to support the higher data rates, the architecture will no longer work with the older 5-volt hardware used on PCIe versions 1.1 and 2.0. Whereas PCIe 2.3 supports both 5V and 3.3V cards, PCIe 3.0 will be 3.3V only. That means most current 5V hardware will be obsolete when PCIe 3.0 debuts.When is it coming? PCI-SIG, the group that oversees PCI architecture specifications, expects to release the final PCIe 3.0 spec in 2009. PCIe 3.0 graphics cards should hit the market in 2010.Pocket PresentationsWatching video on a cell phone is a pain. Even if you find the content you want, the tiny screen makes enjoying the program difficult. Before long, however, you’ll be seeing shows right-sized again, thanks to your projector-equipped cell phone.What is it? Microvision Pico projectors employ light scanning technology to generate a complete, full-color image from a beam of light. Within the device it’s embedded in, a single red, green, or blue laser bounces off a tiny scanning mirror that oscillates vertically and horizontally to render the image pixel by pixel, producing a larger picture that projects onto a wall or other surface (as large as 120 inches, from 12 feet away in a darkened room). Controlling the scanner, the light source, and the optics is the PicoP engine, which coordinates the various components to control the intensity of each beam of light to create thousands of colors. By using a single beam of light rather than three beams, Microvision is able to make the projectors small enough to fit into cell phones without appreciably increasing the size of the phones. And the company even expects the integrated projectors to play a feature-length movie on just one cell phone charge.When is it coming? Microvision has partnered with Motorola to build Pico projectors into mobile phones, and the first projector-equipped model is expected to debut in 2009. Meanwhile, the company is designing a projector accessory for PCs and game consoles that should be available by the end of 2008. Built-in projectors can be expected to add as much as $150 to the price of a phone, while accessory projectors will likely cost around $200, says Avi Greengart, principal analyst for mobile devices at Current Analysis and editor of the Home Theater View blog.Tech Beyond 2010Gigabit Internet (2012): Dogged by the speed of your home broadband service? With a gigabit Internet connection over a fiber-optic line, you’ll be able to download the latest movies in less than a minute at speeds up to 1 gbps.Mobile fuel cells (2013): Now in development, hydrogen fuel cells will power your laptop for a week at a time using store-bought fuel cartridges.Smart homes (2014): We’ve heard for years about the smart home–a house chock-full of computer-driven appliances that cater to your every need. As homes with built-in ethernet wiring become more common in several years, central home PCs will control everything from the thermostat to the lighting to the security system.Probe storage (2015): Code-named Millipede, the probe storage system being developed by IBM will use atomic force microscopy (think itsy-bitsy dots) to store more than a terabyte of data per square inch on a polymer surface. An array of thousands of little probes will be able to read and write large amounts of that data far more quickly than today’s drives can.Nano lightning systems (2015): It has “lightning” right in the name, so you know it’s cool, but it’s really about cooling off your hardware. Microscopic nanotubes will use an electrical charge to generate tiny wind currents on the surface of your chips to cool them down without the aid of fans.Hot ProductsImpatient for the future? These items are due in the next few months.Microsoft Windows Vista SP1: Early in 2008, Microsoft is expected to release its first service pack for Windows Vista. The update will likely include fixes for everything from User Account Control to DirectX 10 performance, as well as a few interface tweaks.Apple Mac OS X Leopard: It’s been a long time coming, but Apple’s latest revision of OS X, version 10.5 ($129), may be available by the time you read this. It includes an enhanced interface with a transparent menu bar, stackable menus, dynamic workspaces, and the Time Machine file-restoration tool.HP MediaSmart Server: Based on Microsoft’s Windows Home Server platform, MediaSmart Server–starting at $599 and due out late this fall–will deliver pictures, music, and movies to devices around the home.Super Talent 32GB SSD 2.5-inch SATA: The 32GB Super Talent drive is one of the first flash-based drives. But early adopters beware: The $500 price tag is likely to drop, particularly after 128GB drives from mainstream makers hit the market next year.Electronic Arts Crysis: Hitting shelves November 16, the $59 sequel to Far Cry looks to be the most visually stunning PC game ever. Developer Crytek has taken full advantage of DirectX 10 graphics technology, offering realism and detail unlike anything we’ve seen.Battles to WatchHere are the top technology fights to follow in the coming years.AMD vs. Intel: Though Intel currently has the performance edge with its Core 2 line and its quad processor, AMD will soon counter with the release of its own quad-core Phenom chips. Expect things to heat up in a big way with the release of consumer graphics-integrated CPUs in 2009.DRM vs. unrestricted access: Will user outrage prompt entertainment resellers to come up with a sensible copy-protection scheme, or will corporations overrun fair-use rights with pay-per-play media services? We’re putting our money on a compromise between the two, as some labels have already begun offering DRM-free music through iTunes and other services in response to consumer demand for more flexible formats.Windows vs. Mac vs. Linux: IDC estimates Apple’s market share at roughly 5 percent in the United States, while Linux is gaining popularity around the world, particularly with governments and educational institutions. Most estimates still peg Linux desktop users at around 1 percent of the market, but the numbers appear to be climbing. This year, Dell and Lenovo gave Linux desktop users a boost by adding to their product lines systems with Linux preinstalled.Microsoft vs. Google: Microsoft’s long-standing dominance in the office-productivity software arena is facing new threats from the likes of Google, which offers its own productivity suite–Google Docs–online. While Docs has yet to make significant inroads against Microsoft Office, Microsoft’s efforts to beat Google at its own game with Live.com have yet to bear fruit. CEO Steve Ballmer’s July announcement that Microsoft will begin shifting to a “Web-enabled desktop” in the coming years suggests that the company takes Google’s threat seriously.Overhyped TrendsHere are three allgedly hot topics we’re tired of hearing about.Microblogging: What are you doing right now? If the answer is “Washing my poodle in the kitchen sink,” we’d rather not know. With short attention spans becoming the norm, services like Twitter and Pownce probably aren’t going away anytime soon–but they’re not very useful, either.UMPCs: In 2005, Microsoft announced a bold new standard for mobile devices known as the Ultra-Mobile PC. Armed with touch screens, GPS, and Wi-Fi, these not-quite-tablet PCs were supposed to revolutionize how and where people compute. But by delivering a platform that’s too small for true productivity and too large for genuine mobility, Microsoft ensured that the UMPC was pretty much dead on arrival, and new designs have done little to arouse consumer interest–Palm recently scrapped plans for the Foleo, a device with similar dimensions.Kitchen PCs: For a while now, certain trade shows have been annual love-ins for companies hyping a future full of household appliances with built-in computers. In all these years, however, the best thing we’ve seen is LG’s LSC27990, a $4000 icebox with a 15-inch LCD screen crammed into the door. It’s mildly interesting to be able to watch a ballgame or get birthday reminders and weather reports while you’re standing in front of the fridge (assuming you have a cable outlet tucked behind your appliance nook); but these overpriced, barely functional computers amount to little more than amusing proof-of-concept novelties. They’re a far cry from the true smart appliances of the future.Overdue TechAfter years of waiting for these promising technologies, we think they’re still far from mainstream.WiMax: Back in 2003, WiMax was heralded as the ultimate solution to the world’s connectivity problems, capable of covering an entire city with ubiquitous broadband. WiMax today, however, is little more than an IT backbone for long-distance line-of-sight wide-area networks, largely because it’s not very effective for the kinds of mobile devices that most people use for wireless Internet service. The basic technology of WiMax may yet evolve as part of future 4G cellular networks, but that’s still a long way off.IPTV: Oh, how we’ve hungered for the video nirvana that IPTV has been promising. But while Verizon’s FiOS TV and AT&T’s U-Verse are finally rolling out, they’ve yet to produce the amazing lineup of HD channels, on-demand shows, integrated gaming, and digital voice calling the companies claimed would come, and they’re still anything but ubiquitous. Meanwhile, digital cable has evolved enough to take some of the wind out of IPTV’s sails.RFID: If early predictions were to be believed, today you would be walking through the grocery store filling up your cart as tiny radio frequency identification (RFID) tags announced the contents of the cart and an RFID-enabled credit card automatically paid the bill. Ummm, nope. The biggest holdup has come from the very companies attempting to roll out the technology, with industry infighting over standardization keeping RFID on the shelf.Virtual reality: Second Life boasts a 3D space in which users can buy and sell property, create objects, and socialize, but its relatively crude graphics still feel more virtual than real. Virtual reality as folks imagined it in the 1990s isn’t likely to emerge until someone invents a wearable display that people will actually wear. At least we have World of Warcraft. 15+ min read The pace of everyday living may be hectic, but the pace of innovation is downright frenetic. Technologies barely imagined a few years ago are now poised to change the face of computing, as digital devices continue to burrow into every aspect of daily life. Attend this free webinar and learn how you can maximize efficiency while getting the most critical things done right. Free Webinar | Sept 5: Tips and Tools for Making Progress Toward Important Goals September 26, 2007 Register Now »
This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. June 21, 2012 Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now In his book “Mobilized Marketing,” author Jeff Hasen details the strategies and tactics that move products and build loyalty through mobile devices, arguably your most personal means of communicating directly with customers. In the following edited excerpt, Hasen offers insights from seasoned marketing professionals on how to gauge, use and succeed with mobile.Interested in mobile marketing but not sure how or where to get started?Here are tips from three leaders in mobile marketing and their thoughts for those new to the field.1. Do some people watching. — Barbara Williams, a senior-level marketer at Microsoft.”This is something really simple. . . . If you’re not sure if you should be doing mobile, take a page out of classic consumer research mode. . . . Go to the store, go to the mall, go out to dinner, and sit back and watch people. Just watch. Old school. And you see everyone is on their devices and they are spending quite a bit of time on their devices and they’re not making phone calls necessarily and they are not just doing SMS [short message service] — they are doing a lot of things.”When you see that happening around you everywhere you go, think about how can I insert my product or my brand or my message into these experiences. Just look at the world around you. And listen to young people who grew up in the digital age. Their behaviors are completely different. You’ll see this is definitely the route to go in. Invest the time to learn it and understand it. Explore it yourself.”Related: Five Mobile Marketing Questions Every Business Owner Needs Answered2. Keep an eye on what “the little guy” is doing, as well as the titans. — Mario Schulzke, founder of IdeaMensch and director of digital strategy at marketing firm WDCW.”You know, I am not smart enough to tell you about major game-changers. . . . But I can tell you there will be a revolution of incremental innovations that are about to take place. It’s so easy nowadays to build your own website, your own piece of software or your own app. So what’s happening is that a bunch of people are starting to solve the problems that they’ve been having in their own lives and industries. We’ll see some major productivity gains in just about every vertical, driven by people solving problems close to their vest.”Do what feels right. . . . Build a marketing program around tactics that make sense for you. I have many clients who are overwhelmed by Twitter, Facebook, Foursquare and the like. But when we talk about creating content that provides value to existing and potential customers, they get that. Having a roundtable discussion on Twitter is no different than going to a networking meeting. Crafting a webinar and capturing leads via email is no different than speaking at your local Lion’s Club.”Do what makes sense to you, and always think about the value you provide to your audience. Focus on the fundamentals. Respectfully communicate with your customers via all channels. Don’t pretend to be something you’re not, and do the right thing.”Related: How to Crack the QR Code for Mobile Marketing3. Create interactive “rich media” designed specifically for your mobile site. — Microsoft’s Williams.”When you think rich media and digital, you tend to think of the standbys like a whole-page takeover or part of an ad will be in the leaderboard at the top of the page and move into one of the units on the side. . . . On mobile, it’s a completely different type of experience. You don’t have the flexibility but you have the entire device. You can incorporate rich functionality where you can shake the device or where it is actually using the camera function in augmented reality or the location function. There are so many other vectors or parameters that are unique to mobile that I think make rich even richer on mobile. But you have to think about it in a different way on mobile.”If you don’t have a mobile landing page attached to that rich media unit, you have kinda left [your customers] hanging. . . . While rich media is an incredible opportunity to pull people in and to really drive engagement and surface up and push the content out, that back end is still needed when they want to continue their journey. . . .”4. Find out how your customers want to communicate with you. — Eileen Woodbury, director of marketing at Clear Channel Los Angeles.”People will communicate with you the way they want to communicate. . . . So texting isn’t replacing the Web. The Web didn’t replace the phone call. People who want to call will want to call. People who never called us before hopefully will engage with us through text. Some people prefer Twitter or are on Facebook all day.”This is the age of choice. People communicate the way they want to. With every new thing that comes along, we’re adding to our arsenal.”Related: The Top Five Mobile Marketing Mistakes 5 min read Opinions expressed by Entrepreneur contributors are their own. Enroll Now for Free
Technology has quickly engulfed the world around us. Everything we do, both at a business and personal level, seems to involve technology in one way or another. However, as that happens, small businesses continue to be a top target for hackers, with the number of organizations hit by cybercrime rising each year. According to The Ponemon Institute’s 2017 State of Cybersecurity in Small & Medium-Sized Businesses report, 61 percent of businesses experienced a cyber attack in 2017, signifying a 6 percent increase from the previous year’s 55 percent. Data breaches were up to 54 percent from 50 percent in 2016.This year promises faster internet, more connectivity, and unfortunately, more cybersecurity threats. Threat Horizon 2018, from the Threat Horizon series by the non-profit association Information Security Forum (ISF), shows that with the growing connectivity, there will be an increase in the information security threat landscape.1. Internet of Things (IoT) leaks.As real-time data collection becomes increasingly important, the IoT is growing too. From monitoring traffic and collecting real-time patient information to optimizing the uptime of industrial equipment, organizations are massively acquiring IoT devices. However, these devices aren’t always secure. This creates a potential backdoor into the organization, warns the ISF.Related: How Smart Technology is on the Verge of Compromising Your Business SecurityIoT works so great because it’s comprised of dozens of devices that hide in plain sight. Be it alarm systems, GPS, web cameras, HVAC or medical devices, such as pacemakers, it’d be hard to guess which of these devices are even connected to the internet in the first place. But since IoT devices lack built-in security, they are often easy targets by hackers.Attackers usually use automated programs to locate IoT devices. Once located, attackers attempt to connect to the device using the default admin credentials. And since most users don’t change them, this is usually a success for the attacker. Once in, the hackers can easily install malware, basically taking the system under their control.Daniel Soderberg, CEO of EyeOnPass, advises changing all passwords immediately when you acquire a new device. “I wouldn’t operate any device with the default password,” he warns. “Default passwords are usually printed and freely available, exposing the user to all manner of cyber dangers.”2. Opaque algorithms. The Threat Horizon 2018 report also warns of the increasing using of algorithms. As organizations continue to fully trust algorithms with the operation and decisions concerning critical systems, the report says, they lose the visibility into the functioning and interaction of their systems.The lack of proper and transparent interactions between algorithms poses a security risk in case unintended interactions between algorithms create incidents — like the U.S. Treasury Bonds “flash crash” of October 2014 that saw bond yields drastically drop briefly before the algorithms corrected themselves.“We know they’re going to do some quirky stuff from time-to-time,” says Steve Durbin, managing director of the ISF. “You need to understand some of the exposure you have to algorithmic systems. We’re building more and more of our systems on top of algorithms — industrial control, critical infrastructure. There’s an increasing risk in this space we need to be addressing.”Related: 10 Artificial Intelligence Trends to Watch in 2018To be able to manage these risks, organizations need to have a human monitoring the execution of operations and decisions often left to algorithms. The report advises organizations to know the risks that come with algorithm-controlled systems and know when to involve a human. Also, they must update their code maintenance policies and identify alternatives to treating algorithm-related incidents, especially when insurance isn’t an option.3. Security researchers are being silenced.Security researchers are often the whistleblowers. They impart knowledge about digital vulnerabilities, making sure systems are secure and users’ data remains in the intended hands. When they are silenced, either by the government or private companies, it’s often a loss for all users.With software replacing hardware in most major sectors, users and businesses depend on researchers to unearth vulnerabilities and make them public as part of ongoing efforts to improve security. However, lately, manufacturers have been responding to such actions by taking legal action instead of working with the research to fix those vulnerabilities. The ISF predicts that this trend will only grow; exposing customers to vulnerabilities that manufacturers have decided to hide rather than fix.To protect themselves, the ISF advises technology buyers, which include small businesses, to insist on transparency during the procurement process. It advises manufacturers to take it more positively when vulnerabilities are found within their systems by rewarding the researchers rather than attempting to punish them.Considering that a researcher might find a vulnerability in a tool in 2018 and not report it, it’s imperative for the small business owner to take a step further in protecting themselves, even if it means working with other business in order to come up with an affordable solution.Related: Making Your Data Unreadable to Whoever Steals It Might Be the Only Way to Keep It SafeTransparency is key.When it comes to security, transparency has a great role to play. But this part has long been left for the security professionals. If all users reflected some degree of transparency, security in the cyberspace would be easier to achieve. If the non-technical managers and leaders understood the impact of good and poor protection, they would use the cyber assets they have more responsibly. Employees would be more careful about the devices they introduce to the network.As the business owner, it’s your job to carefully manage the inventory of the connected IoT devices. “Some things have internet capabilities that you didn’t ask for and will never use,” says Leon Adato of SolarWinds adding that any devices that don’t need to be connected to the internet should be disconnected. 6 min read Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Opinions expressed by Entrepreneur contributors are their own. Growing a business sometimes requires thinking outside the box. January 31, 2018 Register Now »